Anyone but Him: The Complexity of Precluding an Alternative Edith Hemaspaandra

Anyone but Him: The Complexity of Precluding an Alternative∗
Edith Hemaspaandra
Lane A. Hemaspaandra
Jörg Rothe
Department of Computer Science
Rochester Institute of Technology
Rochester, NY 14623, USA
eh@cs.rit.edu
Department of Computer Science
University of Rochester
Rochester, NY 14627, USA
lane@cs.rochester.edu
Institut für Informatik
Heinrich-Heine-Universität Düsseldorf
40225 Düsseldorf, Germany
rothe@cs.uni-duesseldorf.de
Abstract
Preference aggregation in a multiagent setting is a central
issue in both human and computer contexts. In this paper,
we study in terms of complexity the vulnerability of preference aggregation to destructive control. That is, we study the
ability of an election’s chair to, through such mechanisms as
voter/candidate addition/suppression/partition, ensure that a
particular candidate (equivalently, alternative) does not win.
And we study the extent to which election systems can make
it impossible, or computationally costly (NP-complete), for
the chair to execute such control. Among the systems we
study—plurality, Condorcet, and approval voting—we find
cases where systems immune or computationally resistant to
a chair choosing the winner nonetheless are vulnerable to the
chair blocking a victory. Beyond that, we see that among
our studied systems no one system offers the best protection
against destructive control. Rather, the choice of a preference aggregation system will depend closely on which types
of control one wishes to be protected against. We also find
concrete cases where the complexity of or susceptibility to
control varies dramatically based on the choice among natural tie-handling rules.
Key words: preferences, computational complexity, multiagent systems.
Introduction
Voting systems provide a broad model for aggregating preferences in a multiagent setting. The literature on voting is
vast and active, and spans such areas as AI, complexity, economics, operations research, and political science. As noted
by Conitzer, Lang, and Sandholm (2003), voting has been
proposed as a mechanism for use in decision-making in various computational settings, including planning (Ephrati &
Rosenschein 1991; 1993) and collaborative filtering (Pennock, Horvitz, & Giles 2000). Voting also may be useful in
many large-scale computer settings. Examples of much recent interest include the (web-page) rank aggregation problem, and related issues of reducing “spam” results in web
∗
Supported in part by the NSF under grants NSF-CCR-0311021
and NSF-CCF-0426761 and by the DFG under grant RO 1202/9-1.
This work was done in part while the authors were visiting Klaus
Wagner at the University of Würzburg, and while the first author
was on sabbatical at the University of Rochester.
c 2005, American Association for Artificial IntelliCopyright gence (www.aaai.org). All rights reserved.
search and improving similarity search, for which the use
of voting systems has been proposed (Dwork et al. 2001;
Fagin, Kumar, & Sivakumar 2003). In such an automated
setting, it is natural to imagine decisions with thousands or
millions of “voters” and “candidates.”
In the seminal paper “How hard is it to control an election?” (Bartholdi, Tovey, & Trick 1992), the issue of constructive control of election systems is studied: How hard
is it for a chair (who knows all voters’ preferences) to—
through control of the voter or candidate set or of the
partition structure of an election—cause a given candidate
(equivalently, alternative) to be the (unique) winner?1 They
studied plurality and Condorcet voting, and seven natural types of control: adding candidates, suppressing candidates, partition of candidates, run-off partition of candidates,
adding voters, suppressing voters, and partition of voters.
They found that in some cases there is immunity to constructive control (if his/her candidate was not already the2
unique winner, no action of the specified type by the chair
can make the candidate the unique winner), in some cases
there is (computational) resistance to constructive control
(it is NP-complete to decide whether the chair can achieve
his/her desired outcome), and in some cases the system is
(computationally) vulnerable to constructive control (there
is a polynomial-time algorithm that will tell the chair how to
achieve the desired outcome whenever possible3 ).
In this paper, we obtain results for each of their 14 cases
(two preference aggregation systems, each under seven con1
In their model, which is also adopted here, the chair has complete information on the voters’ preferences. This is a natural assumption in many situations. For example, in a computer science
department, after endless discussions, most people know what each
person’s position is on key issues. Also, since the case where complete information is available to the chair is a special subcase of the
more general setting that allows information to be specified with
any level of completeness, lower bounds obtained in the complete
information setting are inherited by any natural incomplete information model.
2
Really “a unique winner,” since there may be no winner at all,
but we’ll usually write “the unique winner” when this is clear from
context.
3
This is more like “computationally certifiably-vulnerable,” see
Definition 1. Vulnerability as defined in (Bartholdi, Tovey, & Trick
1992) means one can quickly decide if there exists a way for the
chair to achieve the desired outcome.
AAAI-05 / 95
trol schemes) in the setting of destructive control. In contrast
with constructive control, in which a chair tries to ensure that
a specified desirable candidate is the (unique) winner, in destructive control the chair tries to ensure that a specified detested candidate is not the (unique) winner. Regarding the
naturalness of destructivity, the light-hearted title of this paper tries to reflect the fact that, in human terms, one often
hears feelings expressed that focus strategically on precluding one candidate, and of course in other settings this also
may be a goal. Regarding the reality of electoral control,
from targeted “get-out-the-vote” advertisements of parties
and candidates to (alleged) voter suppression efforts by independent groups, from the way a committee chair groups alternatives to any case where a faculty member hands out student course evaluations on a day some malcontent students
are not in class, it is hard to doubt that the desire for electoral
control—both destructive and constructive—is a real one.
Destruction has been previously studied by Conitzer,
Lang, and Sandholm (2002; 2003), but in the setting of
election manipulation—in which some voter(s) knowing all
other voters’ preferences are free to shift their preferences
dynamically to affect the outcome. In contrast, in this paper
we study destruction in the very different setting of electoral
control (Bartholdi, Tovey, & Trick 1992)—where a chair,
given fixed and unchangeable voter preferences, tries to influence the outcome via procedural/access means.
One might ask, “Why bother studying destructive control, since any rational chair would prefer to assert constructive control?” The answer is that it is plausible—and our
results show it is indeed the case—that destructive control
may be possible in settings in which constructive control is
not. Informally put, destructive control may be easier for
the chair to assert. For example, we prove formally that of
the seven types of constructive control of Condorcet elections that Bartholdi, Tovey, and Trick (1992) study, the four
they showed not vulnerable to constructive control are all
vulnerable to destructive control. The remaining three cases
regarding Condorcet voting are vulnerable to constructive
control (Bartholdi, Tovey, & Trick 1992), but we show that
they are immune to destructive control.4
4
Savvy readers may wonder whether the last statement is impossible. After all, to ensure that the despised candidate c is not
the unique winner, we simply have to ask whether at least one
of the other candidates can be ensured to unique-win-or-tie-forwinner. Formally put, destructive control polynomial-time disjunctively truth-table reduces (Ladner, Lynch, & Selman 1975) to
constructive control (redefined to embrace ties), and so the destructive control problem can (within a polynomial factor) be no
less hard computationally than the (redefined) constructive control
problem (this is noted in a different setting by Conitzer and Sandholm (2002)), seemingly (though not really) contrary to the three
cases just mentioned. The brief explanation of why this does not
cause a paradox lies in the word “computational”: Although immunity is the most desirable case in terms of security from control, the complexity of recognizing whether a given candidate can
be precluded from winning in immune cases will most typically
be in P—after all, we can never, when immunity holds, change
a given candidate from unique winner to not the unique winner,
so the related decision problem is typically easy. (Technical side
remark: We say “will most typically be in P/is typically” rather
Table 1 summarizes our results on the complexity of destructively controlling Condorcet, plurality, and approval
elections. We also when needed obtain, for comparative purposes, new results on the complexity of constructive control,
and Table 1 displays those and also constructive control results of Bartholdi, Tovey, and Trick (1992). All entries in
boldface in Table 1 are new results obtained in this paper; the
other results are due to Bartholdi, Tovey, and Trick (1992).
For each boldface “V” in the table, “certifiably-vulnerable”
is in fact also achieved by our theorems. We mention in
passing that for nonboldface “V”s in the table, “certifiablyvulnerable” can be seen directly from or by modifying the
algorithms of Bartholdi, Tovey, and Trick (1992).
For control-by-partition problems—which will involve
subelection(s)—we distinguish between the models TiesEliminate (TE, for short) and Ties-Promote (TP, for short),
which define what happens when there are ties in a subelection (before the final election), namely, all participating candidates are eliminated (TE), or all who tie for winner move
forward (TP). Note that these models do not apply to Condorcet voting, under which when a winner exists s/he is inherently unique; so the TE/TP distinction is made only for
plurality and approval voting.
The natural conclusion to draw from our results is that
when selecting an election/preference aggregation system,
one should at least be aware of the issue of the system’s
vulnerability to control—and, beyond that, one’s choice of
system will depend closely on which types of immunity or
computational resistance one most values. Our results also
show that constructive and destructive control often differ
greatly: A system immune to constructive control may be
vulnerable to destructive control, and vice versa. Finally,
our results show that—in contrast with some comments in
earlier papers—breaking ties is far from a minor issue: For
both voting types where tie-handling rules are meaningful,
we find cases where the complexity of or susceptibility to
control varies dramatically based on the choice among natural tie-handling rules.
Preliminaries
We first define the three voting systems considered. In approval voting, each voter votes “Yes” or “No” for each candidate. (So, for approval voting, a voter’s preferences are
reflected by a 0-1 vector.) All candidates with the maximum
number of “Yes” votes are winners.
Plurality and Condorcet voting are defined in terms of
strict preferences. For them, an election is given by a preference profile, a pair (C, V ) such that C is a set of candidates
and V is the multiset (henceforth, we’ll just say set, as a
shorthand) of the voters’ preference orders on C. We assume
that the preference orders are irreflexive and antisymmetric
than “will be in P/is” because for impractical systems that—unlike
those here—have winner-testing problems that are not in P, it is in
concept possible that one can have immunity and yet also have the
related language problem not belong to P.)
The disjunctive-truth-table connection mentioned above explains why, if P 6= NP, it is impossible to have computational
resistance to destructive control hold for any problem that, when
redefined to embrace ties, is vulnerable to constructive control.
AAAI-05 / 96
Control by
Adding Candidates
Deleting Candidates
Partition
of Candidates
Run-off Partition
of Candidates
Adding Voters
Deleting Voters
Partition
of Voters
Plurality
Constructive Destructive
R
R
R
R
TE: R
TE: R
TP: R
TP: R
TE: R
TE: R
TP: R
TP: R
V
V
V
V
TE: V
TE: V
TP: R
TP: R
Condorcet
Constructive Destructive
I
V
V
I
V
I
V
I
R
R
R
V
V
V
Approval
Constructive Destructive
I
V
V
I
TE: V
TE: I
TP: I
TP: I
TE: V
TE: I
TP: I
TP: I
R
V
R
V
TE: R
TE: V
TP: R
TP: V
Table 1: Summary of results. Results new to this paper are in boldface. Nonboldface results are due to Bartholdi, Tovey, and
Trick (1992). Key: I = immune, R = resistant, V = vulnerable, TE = Ties-Eliminate, TP = Ties-Promote.
(i.e., every voter has strict preferences over the candidates),
complete (i.e., every voter ranks each candidate), and transitive.
A voting system is a rule for how to determine the winner(s) of an election. Formally, any voting system is defined
to be a (social choice) function mapping any given preference profile (or the analog with voters’ 0-1 vectors for the
approval voting case) to society’s aggregate choice set, the
set of candidates who have won the election.
In plurality voting, each candidate with a maximum number of “first preference among the candidates in the election” voters for him/her wins. In Condorcet voting, for each
c ∈ C, c is a winner if and only if for each d ∈ C with
d 6= c, c defeats d by a strict majority of votes in a pairwise
election between them based on the voters’ preferences.
The Condorcet Paradox observes that whenever there are
at least three candidates, due to cyclic aggregate preference rankings Condorcet winners may not exist (Condorcet
1785). That is, the set of winners may be empty. However, a Condorcet winner is unique whenever one does exist. In the case of plurality and approval voting, due to
ties, there may exist multiple winners. Regarding ties, we—
following Bartholdi, Tovey, and Trick (1992) to best allow
comparison—focus in our control problems on creating a
unique winner (constructive), and precluding a candidate
from being the unique winner (destructive). (Ties in subelections, for the partition problems, are handled via the TE
and TP rules described earlier.)
Results
The issue of control of an election by the authority conducting it (called the chair) can be studied under a variety of
models and scenarios. For plurality and Condorcet voting,
Bartholdi, Tovey, and Trick (1992)—which for the rest of
this section will be referred to as “BTT92”—study constructive control by adding candidates, deleting candidates, partition of candidates, run-off partition of candidates, adding
voters, deleting voters, and partition of voters. In their setting, the chair’s goal is to make a given candidate uniquely
win the election. Analogously, we consider in turn the corresponding seven destructive control problems, where the
chair’s goal is to preclude a given candidate from being the
unique winner. For each of these seven we define the problem and present prior results and our results. (Formally,
for each type of control one defines a decision problem and
studies its computational complexity.) To make comparisons
as easy as possible, we in stating these seven control problems whenever possible exactly follow BTT92’s wording—
modified to the destructive case (and when we diverge, we
explain why and how).
Destructive Control by Adding Candidates As is common, we state our decision problems as “Given” instances,
and a related Yes/No question. The language in each case is
the set of all instances for which the answer is Yes.
Given: A set C of qualified candidates and a distinguished
candidate c ∈ C, a set D of possible spoiler candidates,
and a set V of voters with preferences (in the approval
case, the “preferences” will, as always for that case, actually be 0-1 vectors) over C ∪ D.
Question: Is there a choice of candidates from D whose
entry into the election would assure that c is not the unique
winner?
The above type of destructive control captures the idea
that the chair tries to dethrone the despised candidate c by
introducing new “spoiler” candidates.
With this first problem stated, now is a good time to define
our notions of control. Our terminology will closely follow
the notions in BTT92, to allow comparison.
Definition 1 We say that a voting system is immune to destructive control in a given model (of control) if it is never
possible for the chair to change a given candidate from
the unique winner to being not the unique winner by using
his/her allowed model of control. If a system is not immune
to a type of control, it is said to be susceptible to that type of
control.
A voting system is said to be (computationally) vulnerable
to control if it is susceptible to control and the corresponding
language problem is computationally easy (i.e., solvable in
polynomial time). If a system is not just vulnerable but one
can, given a control problem, produce in polynomial time
AAAI-05 / 97
the actual action of the chair to execute control the “best”
way (namely, by adding or deleting the smallest number of
candidates or voters for add/delete problems; for partition
problems, any legal partition that works is acceptable), we
say the system is (computationally) certifiably-vulnerable to
control.5
A voting system is said to be resistant to control if it is susceptible to control but the corresponding language problem
is computationally hard (i.e., NP-complete).6
For the theory of NP-completeness, see, e.g., (Garey &
Johnson 1979; Hopcroft & Ullman 1979). For space reasons we do not explicitly define the corresponding notions
for constructive control (except briefly in the introduction)
and the analogous seven constructive control decision problems from BTT92, but except when noted below they are
exactly analogous. For example, for the above control scenario, the analogous constructive problem pairs the same
“Given” with the question “Is there a choice of candidates
from D whose entry into the election would assure that c is
the unique winner?”
As to what is known about Control by Adding Candidates,
BTT92 showed that plurality is resistant and Condorcet is
immune. Our results are:
Theorem 2 Approval (voting) is immune to constructive control by adding candidates, and plurality, Condorcet, and approval (voting) are respectively resistant,
vulnerable/certifiably-vulnerable, and vulnerable/certifiably-vulnerable to destructive control by adding candidates.
So, though Condorcet and approval are immune to constructive control of this sort, they both are vulnerable to destructive control. This reverses itself for:
Destructive Control by Deleting Candidates
Given: A set C of candidates, a distinguished candidate c ∈
C, a set V of voters, and a positive integer k < ||C||.
Question: Are there k or fewer candidates other than c in
C whose disqualification would assure that c is not the
unique winner?
5
For the seven problems studied here, certifiably-vulnerable implies vulnerable (but we list both, since if one studied add/delete
problems stated not in terms of “is there some subset” or “by
adding/deleting ≤ k” but rather in terms of “by adding/deleting
exactly k,” then for certain systems the implication need not hold).
6
It would be more natural to define resistance as meaning the
corresponding language is (many-one) NP-hard. However, in this
paper, we define resistance in terms of NP-completeness. One reason is that this matches the way the term is used by BTT92. More
importantly, all the problems discussed in this paper have obvious
NP upper bounds since testing whether a given candidate has won a
given election for the systems considered here is obviously in P. So
for the problems in this paper, NP-completeness and NP-hardness
stand or fall together. We mention in passing that there are natural election systems whose complexity seems beyond NP. The first
such case established was for the election system defined by Lewis
Carroll in 1876 (Dodgson 1876), where even the complexity of determining whether a given candidate has won is now known to be
hard for parallel access to NP (Hemaspaandra, Hemaspaandra, &
Rothe 1997).
In this type of control, the chair seeks to influence the
outcome of the election by suppressing certain candidates
(other than c), in hopes that their voters now support another
candidate to ensure stopping c. Note that this formalization
is not a perfect analog of the constructive case of BTT92
in that we explicitly prevent deleting c, since otherwise any
voting system in which the winners can efficiently be determined would be trivially vulnerable to this type of control.
Here, BTT92 establish for constructive control resistance
for plurality and immunity for Condorcet. Our results are:
Theorem 3 Approval is vulnerable/certifiably-vulnerable
to constructive control by deleting candidates. Plurality,
Condorcet, and approval voting are respectively resistant,
immune, and immune to destructive control by deleting candidates.
We now handle jointly the two types of partition of candidates, since they yield identical results.
Destructive Control by Partition of Candidates
Given: A set C of candidates, a distinguished candidate c ∈
C, and a set V of voters.
Question: Is there a partition of C into C1 and C2 such
that c is not the unique winner in the sequential two-stage
election in which the winners in the subelection (C1 , V )
who survive the tie-handling rule move forward to face
the candidates in C2 (with voter set V )?
Destructive Control by Run-Off Partition of Candidates
Given: A set C of candidates, a distinguished candidate c ∈
C, and a set V of voters.
Question: Is there a partition of C into C1 and C2 such that
c is not the unique winner of the election in which those
candidates surviving (with respect to the tie-handling
rule) subelections (C1 , V ) and (C2 , V ) have a run-off
with voter set V .
These two types of control express settings in which the
chair tries to, overall, partition the candidates in such a
clever way that the hated candidate c fails to be the unique
winner—one via a cascading setup, and one via a run-off
setup. Here, BTT92 show that for constructive control plurality is resistant (and their results hold in both our TE and
TP models) and Condorcet is vulnerable. Our results are:
Theorem 4 Approval is vulnerable/certifiably-vulnerable
to constructive control by partition of candidates and runoff partition of candidates in model TE and immune to constructive control by partition of candidates and run-off partition of candidates in model TP. Plurality, Condorcet, and
approval voting are, in models TE and TP, respectively resistant, immune, and immune to destructive control by partition
of candidates and by run-off partition of candidates.
So Condorcet, though vulnerable to constructive control, is
immune to destructive control here. And, perhaps more interesting, for constructive control, approval changes from
vulnerable to immune depending on the tie-handling rule.
We now turn to control of the voter set. The intuition behind seeking destructive control by adding or deleting voters
is clear, e.g., getting out the vote and vote suppression. We
handle these two cases together as their results are identical.
AAAI-05 / 98
Destructive Control by Adding Voters
Given: A set of candidates C and a distinguished candidate
c ∈ C, a set V of registered voters, an additional set W of
yet unregistered voters (both V and W have preferences
over C), and a positive integer k ≤ ||W ||.
Question: Are there k or fewer voters from W whose registration would assure that c is not the unique winner?
Destructive Control by Deleting Voters
Given: A set of candidates C, a distinguished candidate c ∈
C, a set V of voters, and a positive integer k ≤ ||V ||.
Question: Are there k or fewer voters in V whose disenfranchisement would assure that c is not the unique winner?
Here, BTT92 show that for constructive control plurality
is vulnerable and Condorcet is resistant. Our results are:
Theorem 5 Approval is resistant to constructive control
by adding voters and by deleting voters. Plurality, Condorcet, and approval voting are all vulnerable/certifiablyvulnerable to destructive control by adding voters and by
deleting voters.
So Condorcet and approval, though resistant to constructive
control, are vulnerable to destructive control here.
The final problem here results in a surprise.
Destructive Control by Partition of Voters
Given: A set of candidates C, a distinguished candidate c ∈
C, and a set V of voters.
Question: Is there a partition of V into V1 and V2 such that
c is not the unique winner in the hierarchical two-stage
election in which the survivors of (C, V1) and (C, V2) run
against each other with voter set V ?
In this last type of control, the voter set is partitioned into
two “subcommittees” that both separately select their “nominees,” who run against each other in the final decision stage.
Unlike BTT92, we again distinguish between the two models Ties-Eliminate and Ties-Promote defined above. That is,
in the Ties-Eliminate model, if two or more candidates tie
for winning in a subcommittee’s election, no candidate is
nominated by that subcommittee. In contrast, in the TiesPromote model, all the candidates who tie for winning in
a subcommittee’s election are nominated to run in the final
decision stage. If both subcommittees nominate the same
candidate (and no one else), we by convention declare this
candidate the run-off winner—one cannot eliminate oneself.
We mention that both of our two tie-handling models, TE
and TP, differ from the model adopted in BTT92, where they
for vulnerability results about this problem adopt a third
model in which ties are handled not by a tie-handling rule
but rather by changing the decision problem itself to require
the chair to find a partition that completely avoids ties in any
subcommittee. We find our model the more natural, but we
mention that they obtained for this case, in their tie model,
a constructive-control vulnerability result for plurality. For
Condorcet and constructive control, they proved that resistance holds. Our results are:
Theorem 6 Approval is resistant to constructive control by partition of voters in models TE and TP,
vulnerable/certifiably-vulnerable to destructive control by
partition of voters in models TE and TP. Plurality is
vulnerable/certifiably-vulnerable to both constructive and
destructive control by partition of voters in model TE,
and is resistant to both constructive and destructive control by partition of voters in model TP. Condorcet is
vulnerable/certifiably-vulnerable to destructive control by
partition of voters.
The most striking behavior here is that plurality voting varies
between being vulnerable and being resistant, depending on
the tie-handling rule. The loose intuition for this is that in
TE, at most one candidate wins each subcommittee and in
polynomial time we can explore every way this can happen.
In contrast, under TP potentially any subset of candidates
may move forward, and in this particular setting, that flexibility is enough to support NP-completeness. Also interesting is that both Condorcet and approval, while resistant to
constructive control, are vulnerable to destructive control.
Proof Comments
This section tries to give some general feeling for the proofs.
Complete proofs will be included in the full version of this
paper.
Immunity results are generally clear from the definitions.
For example, note that any system satisfying, as does approval voting, the “unique” version of the Weak Axiom of
Revealed Preference—a unique winner among a collection
of candidates always remains a unique winner among every
subcollection of candidates that includes him/her—is immune to destructive control by deleting candidates, by partition of candidates, and by run-off partition of candidates.
The certifiably-vulnerable results (which here imply the
vulnerable results) range from clear greedy algorithms to
trickier algorithms based on characterizing the ways in
which a candidate can be precluded from winning (or for
the constructive case, made to win). The more surprising
of these have to do with the tie-handling cases of partition
problems—where the chair can at times do shrewd things
(e.g., shift voters counterintuitively to induce ties that kill
off stronger candidates).
For illustration, we now prove that approval voting is
vulnerable/certifiably-vulnerable to destructive control by
partition of voters in the TP model. An easy example shows
that approval voting is susceptible to this type of control: Let
C = {a, b, c}, and define V to consist of the following ten
voters (specified by 0-1 vectors): v1 = v2 = v3 = v4 =
100, v5 = v6 = v7 = 010, and v8 = v9 = v10 = 001.
In (C, V ), a is the unique winner. But if V is partitioned
into V1 = {v1 , v2 , v5 , v6 , v7 } and V2 = V − V1 , b and c
are nominated by the subcommittees (C, V1) and (C, V2), respectively, and tie for winner in the run-off.
Now, given a set of candidates C, a distinguished candidate c ∈ C, and a voter set V , our polynomial-time algorithm for this problem works as follows. If C = {c}, output
“control impossible,” as c must win; else if c already is not
the unique winner, output (V, ∅) as a successful partition.
AAAI-05 / 99
Otherwise, if ||C|| = 2, output “control impossible,” since
in the current case c is the unique winner, so c will win at
least one subcommittee and also the run-off. If none of the
above cases applies, for each a, b ∈ C with ||{a, b, c}|| = 3,
we test whether we can make a strictly beat c in (C, V1) and
make b strictly beat c in (C, V2). For each voter in V , we
focus just on his/her approval of a, b, and c, represented
as the vector abc ∈ {0, 1}3 . Denote the number of voters
with preference 000 or 111 by N , with 001 by Wc , with
110 by Lc , with 100 by Sa , with 010 by Sb , with 101 by
Sac , and with 011 by Sbc . Since c is the approval winner,
Wc + Sbc − (Lc + Sa ) > 0 and Wc + Sac − (Lc + Sb ) > 0.
If Wc − Lc > Sac + Sa + Sbc + Sb − 2 or Sac + Sa = 0
or Sbc + Sb = 0, then this a and b are hopeless, so move on
to consider the next a and b in the loop. Otherwise, we have
Wc − Lc ≤ Sac + Sa + Sbc + Sb − 2 and Sac + Sa > 0
and Sbc + Sb > 0, and output (V1 , V2) as a successful partition, where V1 contains all voters contributing to Sac and Sa ,
and also min(Wc , Sac + Sa − 1) voters contributing to Wc ,
and V2 = V − V1 . In (C, V1), a (strictly) beats c, since a
gets Sac + Sa − min(Wc , Sac + Sa − 1) more Yes votes
than c. And in (C, V2), b (strictly) beats c, since b has
Sbc + Sb + Lc − (Wc − min(Wc , Sac + Sa − 1)) more Yes
votes than c. So, for the construction to work, we must argue
that Sbc + Sb + Lc + min(Wc , Sac + Sa − 1) − Wc > 0. That
is, we need Wc −Lc < min(Wc , Sac +Sa −1)+Sbc +Sb . If
Wc ≤ Sac +Sa −1, this reduces to 0 < Lc +Sbc +Sb , which
follows from the fact that in the current case Sbc + Sb > 0.
And if Wc > Sac + Sa − 1, the desired inequality follows
from the known fact that Wc −Lc ≤ Sac +Sa +Sbc +Sb −2.
To conclude the polynomial algorithm, if in no loop iteration
did we find an a and b that allowed us to output a partition
of voters dethroning c, then output “control impossible.”
Finally, the resistance results are based on clear containments in NP, plus (polynomial-time, many-one) reductions establishing NP-hardness. We whenever possible try
to achieve multiple resistance results via a single proof.
For example, with a single proof we establish all seven
resistance results for plurality voting: destructive control by
adding, deleting, partition (TE and TP), and run-off partition (TE and TP) of candidates,7 and by partition of voters (TP). We now sketch this proof, which is achieved via
one general construction that yields the reductions, each
from the NP-complete problem Hitting Set: Given a set
B = {b1 , b2 , . . . , bm }, a family S = {S1 , S2 , . . . , Sn } of
subsets Si of B, and a positive integer k, does S have a hitting set of size at most k, i.e., is there a set B 0 ⊆ B with
||B 0 || ≤ k such that for each i, Si ∩ B 0 6= ∅? Given a triple
(B, S, k), we construct the following election. The candidate set is C = B ∪ {c, w}. The voter set V is defined as
follows. There are 2(m−k)+2n(k+1)+4 voters of the form
w > c > · · ·, where “· · ·” means that the remaining candidates follow in some arbitrary order. There are 2n(k +1)+5
voters of the form c > w > · · ·. For each i, 1 ≤ i ≤ n, there
7
Our constructions ensure that the distinguished candidate is
never tied for winner in any subelection in the image of the NPhardness reduction. Thus, these results hold both in the TiesEliminate and Ties-Promote models.
are 2(k + 1) voters of the form Si > w > · · ·, where “Si ”
denotes the elements of Si in some arbitrary order. Finally,
for each j, 1 ≤ j ≤ m, there are two voters of the form
bj > c > · · ·.
We show that S has a hitting set of size less than or equal
to k if and only if destructive control by adding candidates
can be executed for the election with qualified candidates
{c, w}, spoiler candidates B, distinguished candidate w, and
voters V . For every candidate d, let sc(d) denote the number
of voters who rank d first. If B 0 is a hitting set of S of size k,
then in the election (B 0 ∪ {c, w}, V ), sc(w) = 2(m − k) +
2n(k + 1) + 4 and sc(c) = 2n(k + 1) + 5 + 2(m − k). It
follows that w is not the unique winner of (B 0 ∪ {c, w}, V ).
For the converse, suppose that w is not the unique winner
of an election (B 0 ∪ {c, w}, V ), where B 0 ⊆ B. We show
that then B 0 is a hitting set of S of size at most k. First
note that for all B 0 ⊆ B and for all b ∈ B 0 , sc(b) < sc(w)
in (B 0 ∪ {c, w}, V ). So, if w is not the unique winner of
(B 0 ∪ {c, w}, V ), then sc(c) ≥ sc(w) in (B 0 ∪ {c, w}, V ).
In (B 0 ∪ {c, w}, V ), sc(c) = 2n(k+1)+5+2(m−||B 0 ||)
and sc(w) = 2(m − k) + 2n(k + 1) + 4 + 2(k + 1)`, where
` is the number of sets in S that are not hit by B 0 (i.e., that
have an empty intersection with B 0 ). Since sc(w) ≤ sc(c),
it follows that 2(m − k) + 2(k + 1)` ≤ 1 + 2(m − ||B 0 ||),
which implies (k + 1)` + ||B 0 || − k ≤ 0. So ` = 0. Thus, B 0
is a hitting set of S of size at most k. It follows that plurality
is resistant to destructive control by adding candidates.
A similar argument can be used to show that S has a hitting set of size at most k if and only if the election with
candidates C, distinguished candidate w, and voters V can
be destructively controlled by deleting at most m − k candidates. (The proof is omitted.) Thus, plurality is resistant to
destructive control by deleting candidates.
Furthermore, S has a hitting set of size at most k if and
only if the election with candidates C, distinguished candidate w, and voters V can be destructively controlled by
partitioning C into C1 = B 0 ∪ {c, w} and C2 = B − B 0 ,
where B 0 is a hitting set of S of size ≤ k. (The proof is omitted. Since w never ties for winner in a subelection, the proof
works for both TE and TP.) A similar argument works for
destructive control for run-off partition of candidates. Thus,
plurality is resistant to destructive control by partition and
run-off partition of candidates (both in TE and TP).
Finally, we show that plurality is resistant to destructive
control by partition of voters in the TP model. To this end,
we reduce from the Hitting Set problem restricted to instances where n(k + 1) + 1 ≤ m − k. (The proof that this
restriction of Hitting Set is still NP-complete is omitted.)
We first show that, in the election (C, V ) constructed
above, for every partition of V into V1 and V2 , w is a
winner of (C, V1) or of (C, V2). For a contradiction, suppose that w is a winner of neither (C, V1) nor (C, V2). Let
x ∈ B ∪ {c} be a winner of (C, V1) with score scV1 (x), and
let y ∈ B ∪ {c} be a winner of (C, V2) with score scV2 (y).
Then scV1 (x) + scV2 (y) ≥ scV (w) + 2. Since w’s score in
(C, V ) is greater than that of any other candidate, x 6= y.
It follows that scV1 (x) + scV2 (y) ≤ scV (c) + scV (bi ) ≤
2n(k +1)+5+2n(k +1)+2 ≤ 2n(k +1)+5+2(m−k) =
scV (w) + 1, a contradiction. We can now show that, assum-
AAAI-05 / 100
ing n(k + 1) + 1 ≤ m − k, S has a hitting set of size at
most k if and only if V can be partitioned such that w is
not the unique winner of (C, V ) in the TP model. If B 0 is a
hitting set of size at most k, let V1 consist of one voter each
of the form c > w > · · · and bj > c > · · ·, for each j,
1 ≤ j ≤ m, and let V2 = V − V1 . Then the winners of
(C, V1) are B 0 ∪ {c}, and the winner of (C, V2) is w. It is
easy to see that c is the unique winner in (B 0 ∪ {c, w}, V ).
For the converse, suppose there is a partition of V such that
w is not the unique winner of the election. However, w is a
winner of a subcommittee’s election, as shown above. It follows that w is not the unique winner of a run-off election involving w, i.e., w is not the unique winner in (D ∪ {w}, V ),
where D ⊆ B ∪ {c}. An argument similar to that in the “destructive control by adding candidates” case shows that S
has a hitting set of size at most k. This completes the proof
sketch.
Conclusions
In this paper, we studied the computational resistance and
vulnerability of three voting systems—plurality, Condorcet,
and approval voting—to destructive control by an election’s
chair in each of seven control scenarios: candidate addition,
suppression, partition, and run-off partition, and voter addition, suppression, and partition. We classified each case as
immune, vulnerable, or computationally resistant. We also
studied the analogous constructive control cases and fully resolved those that were not considered by Bartholdi, Tovey,
and Trick.
We identified cases where a system immune to constructive control still can be vulnerable to destructive control
(e.g., Condorcet voting for control by adding candidates),
and vice versa (e.g., approval voting for control by deleting
candidates). We saw that, among the systems studied, none
is globally superior to the others. Rather, when choosing a
voting system, one’s choice will depend on the types of control against which protection is most desired. Finally, we
saw that—in contrast to some comments in earlier papers—
tie-breaking is a far from minor issue: For those control
types that involve partitions of the candidate or voter set, we
studied two natural tie-handling rules, and we found specific
cases in which the complexity of the corresponding control
problem varies crucially depending on which tie-handling
rule is adopted.
Acknowledgments
We thank Jeroen Snippe for helpful comments, and we thank
Klaus Wagner and his group for hosting a visit during which
this work was done in part.
References
Bartholdi, III, J.; Tovey, C.; and Trick, M. 1992. How hard
is it to control an election? Mathematical and Computer
Modeling 16(8/9):27–40.
Black, D. 1958. Theory of Committees and Elections.
Cambridge University Press.
Condorcet, M. 1785. Essai sur l’Application de L’Analyse
à la Probabilité des Décisions Rendues à la Pluralité des
Voix. Facsimile reprint of original published in Paris, 1972,
by the Imprimerie Royale.
Conitzer, V., and Sandholm, T. 2002. Complexity of manipulating elections with few candidates. In Proceedings
of the 18th National Conference on Artificial Intelligence,
314–319. AAAI Press.
Conitzer, V.; Lang, J.; and Sandholm, T. 2003. How many
candidates are needed to make elections hard to manipulate? In Proceedings of the 9th Conference on Theoretical Aspects of Rationality and Knowledge, 201–214. ACM
Press.
Dodgson, C. 1876. A method of taking votes on more than
two issues. Pamphlet printed by the Clarendon Press, Oxford, and headed “not yet published” (see the discussions
in (McLean & Urken 1995; Black 1958), both of which
reprint this paper).
Dwork, C.; Kumar, S.; Naor, M.; and Sivakumar, D. 2001.
Rank aggregation methods for the web. In Proceedings of
the 10th International World Wide Web Conference, 613–
622.
Ephrati, E., and Rosenschein, J. 1991. The Clarke tax
as a consensus mechanism among automated agents. In
Proceedings of the 9th National Conference on Artificial
Intelligence, 173–178. AAAI Press.
Ephrati, E., and Rosenschein, J. 1993. Multi-agent planning as a dynamic search for social consensus. In Proceedings of the 13th International Joint Conference on Artificial
Intelligence, 423–429.
Fagin, R.; Kumar, R.; and Sivakumar, D. 2003. Efficient similarity search and classification via rank aggregation. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, 301–312.
ACM Press.
Garey, M., and Johnson, D. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness.
W. H. Freeman and Company.
Hemaspaandra, E.; Hemaspaandra, L.; and Rothe, J. 1997.
Exact analysis of Dodgson elections: Lewis Carroll’s 1876
voting system is complete for parallel access to NP. Journal of the ACM 44(6):806–825.
Hopcroft, J., and Ullman, J. 1979. Introduction to Automata Theory, Languages, and Computation. AddisonWesley.
Ladner, R.; Lynch, N.; and Selman, A. 1975. A comparison
of polynomial time reducibilities. Theoretical Computer
Science 1(2):103–124.
McLean, I., and Urken, A. 1995. Classics of Social Choice.
University of Michigan Press.
Pennock, D.; Horvitz, E.; and Giles, C. 2000. Social
choice theory and recommender systems: Analysis of the
axiomatic foundations of collaborative filtering. In Proceedings of the 17th National Conference on Artificial Intelligence, 729–734. AAAI Press.
AAAI-05 / 101